Analysis
-
max time kernel
4294182s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
11-03-2022 01:06
Static task
static1
Behavioral task
behavioral1
Sample
3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c.exe
Resource
win10v2004-en-20220113
General
-
Target
3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c.exe
-
Size
552KB
-
MD5
c22961455558772a3eb94b470560b9d5
-
SHA1
9ab4977126485322978f549a30a6c76e9ea2596b
-
SHA256
3b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c
-
SHA512
d0426a2f5bb4ca1461fab19a5b003e27e955b1f9824824cd581d1671ed525147bc262e45812aba827d5955c50b9c631e97bd88ecf669866dc34a529c9c9918e2
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 bot.whatismyipaddress.com